General
-
Target
982f939b9103cee54a1cbfad0a458bace7b6d6d266f976c6b4d72336f57bc702
-
Size
535KB
-
Sample
250130-vadmxswrfw
-
MD5
15def7bf17282c8df2a38f532a312470
-
SHA1
f3b3a4b5bc07b1f671bbd67c6a6560718c68a453
-
SHA256
982f939b9103cee54a1cbfad0a458bace7b6d6d266f976c6b4d72336f57bc702
-
SHA512
67b3e8df979e3b4a8dbc7363976da541fcd229d3dbeb15b4fac7e93de18660a32a9b9ba3327f1ed3b6be04d75c5bdfd31874ec740e8362b07543462c289b7408
-
SSDEEP
12288:u6iXwHyBWuBAqGoIec4RZcJVFpMcS9SN/3tlmtWI1m3:uNwSBWuBAiZcRpMpu3Ou3
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
Leternel01@
Targets
-
-
Target
Purchase Order.exe
-
Size
618KB
-
MD5
d3b15e236df60a0e551bf21a26718250
-
SHA1
66626b523351b325c5d58569ec29d6a197698345
-
SHA256
dbc06aa2f5d8c73c079f19b7799691da6109b3a2afa2ea066c90afbab963acc2
-
SHA512
c4727719c3ec92599e6b0db89c197d102bccc1600c67089ec01bdf3cf1b075b79154febb29b69ac5303495f0859353a527a8583aee5e4ede8e217529e2b4c6b1
-
SSDEEP
6144:5o5JyDt117h5r2V96LUAqGMkMaAxfdXLJHOoOyX9nK6OyJvW/SNRaOlmDD9LGwYd:5RGGUAqGmJd9n1OyJOKtlm9pYr+0
-
Snake Keylogger payload
-
Snakekeylogger family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-